• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3967
  • 566
  • 498
  • 206
  • 200
  • 122
  • 105
  • 79
  • 61
  • 49
  • 34
  • 30
  • 25
  • 18
  • 15
  • Tagged with
  • 7047
  • 2692
  • 2579
  • 2430
  • 1816
  • 1509
  • 1311
  • 1080
  • 666
  • 599
  • 598
  • 593
  • 517
  • 503
  • 502
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Analysis and design of wireless systems with interface and provider diversity competition and cooperation /

Zemlianov, Alexander. De Veciana, Gustavo A., January 2005 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2005. / Supervisor: Gustavo de Veciana. Vita. Includes bibliographical references.
62

The impact of radio signal strength on the design of wireless sensor networks /

Ma, Jian. January 2007 (has links)
Thesis (Ph.D.)--Hong Kong University of Science and Technology, 2007. / Includes bibliographical references (leaves 97-107). Also available in electronic version.
63

Adaptive clustering and transmission range adjustment for topology control in wireless sensor networks

Yin, Bolian. January 2006 (has links)
Thesis (Ph. D.) University of Missouri-Columbia, 2006. / The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on August 10, 2007) Vita. Includes bibliographical references.
64

Packet aggregation for voice over internet protocol on wireless mesh networks

Zulu, Docas Dudu January 2012 (has links)
>Magister Scientiae - MSc / This thesis validates that packet aggregation is a viable technique to increase call capacity for Voice over Internet Protocol over wireless mesh networks. Wireless mesh networks are attractive ways to provide voice services to rural communities. Due to the ad-hoc routing nature of mesh networks, packet loss and delay can reduce voice quality. Even on non-mesh networks, voice quality is reduced by high overhead, associated with the transmission of multiple small packets. Packet aggregation techniques are proven to increase VoIP performance and thus can be deployed in wireless mesh networks. Kernel level packet aggregation was initially implemented and tested on a small mesh network of PCs running Linux, and standard baseline vs. aggregation tests were conducted with a realistic voice traffic profile in hop-to-hop mode. Modifications of the kernel were then transferred to either end of a nine node 'mesh potato' network and those tests were conducted with only the end nodes modified to perform aggregation duties. Packet aggregation increased call capacity expectedly, while quality of service was maintained in both instances, and hop-to-hop aggregation outperformed the end-to-end configuration 4:1. However, implementing hop-to-hop in a scalable fashion is prohibitive, due to the extensive kernel level debugging that must be done to achieve the call capacity increase. Therefore, end-to-end call capacity increase is an acceptable compromise for eventual scalable deployment of voice over wireless mesh networks.
65

Scheduling and Resource Allocation in Multi-user Wireless Systems

Wang, Xuan 15 October 2014 (has links)
In this dissertation, we discuss various aspects of scheduling and resource allocation in multi-user wireless systems. This work starts from how to utilize advanced physical-layer technology to improve the system performance in a multi-user environment. We show that by using superposition coding (SPC) and successive interference cancellation, the system performance can be greatly improved with utility-based scheduling. Several observations are made as the design guideline for such system. Scheduling algorithms are designed for a system with hierarchical modulation which is a practical implementation of SPC. However, when the utility-based scheduling is designed, it is based on the assumption that the system is saturated, {\em i.e.}, users in the system always have data to transmit. It is pointed out in the literature that in a system with stochastic traffic, even if the arrival rate lies inside the capacity region, the system in terms of queue might not be stable with the utility-based scheduling. Motivated by this, we have studied the stability region of a general utility-based scheduling in a multi-user system with stochastic traffic. We show that the stability region is generally less than the capacity region, depends on how to interpret an intermediate control variable, and the resultant stability region may be even non-convex and exhibits undesirable properties which should be avoided. As the utility-based scheduling cannot achieve throughput-optimal, we turn our attentions to the throughput-optimal scheduling algorithms, whose stability region is identical to the capacity region. The limiting properties of an overloaded wireless system with throughput-optimal scheduling algorithms are studied. The results show that the queue length is unstable however the scheduling function of the queue length is stable, and the average throughput of the system converges. Finally we study how to schedule users in a multi-user wireless system with information-theoretic security support, which is focused on the secrecy outage probability. The problem is essentially about how to schedule users, and allocate resources to stabilize the system and minimize the secrecy outage probability. We show that there is a tradeoff between the arrival rate of the traffic and the secrecy outage probability. The relative channel condition of the eavesdropper also plays an important role to the secrecy outage probability. In summary, we showed utility-based scheduling using SPC can improve the system performance greatly, but the utility-based scheduling has limitations: the stability region might not have desired properties. On the contrary throughput-optimal scheduling has its own drawbacks: the traffic cannot be handled properly if the system is overloaded. The further study on the secrecy outage probability gives guideline on how to design a scheduler in a system with information-theoretic security support. / Graduate
66

Towards the design of an energy-aware path selection metric for IEEE 802.11s wireless mesh network

Mhlanga, Martin Mafan January 2012 (has links)
Submitted in accordance with the requirements for the degree of Master of Arts in Communication Science at the University of Zululand, South Africa, 2012. / It is everyone’s dream to have network connectivity all the time. This dream can only be realised provided there are feasible solutions that are put in place for the next generation of wireless works. Wireless Mesh Networking (WMN) is therefore seen as a solution to the next generation of wireless networks because of the fact that WMNs configures itself and it is also self healing. A new standard for WMNs called the IEEE 802.11s is still under development. The protocol that is used by the IEEE 802.11s for routing is called Hybrid Wireless Mesh Protocol (HWMP). The main purpose of HWMP is to perform routing at layer-2 of the OSI model also referred to as the data link layer (DLL). Layer-2 routing is also referred to as the mesh path selection and forwarding. Devices that are compliant to the IEEE 802.11s standard will be able to use this path selection protocol. Devices that are manufactured by different vendors will therefore be interoperable. Even though significant efforts have gone into improving the performance of HWMP, the protocol still faces a lot of limitations and the most limiting factor is the small or restricted energy of the batteries in a wireless network. This is because of the assumption that mesh nodes that are deployed in urban areas tend to have no energy constraints while WMN nodes deployed in rural faces serious energy challenges. The latter relies on batteries and not on electricity supply which powers the WMN nodes in urban areas. This work, therefore, explores further the current trends towards maximising the network lifetime for the energy constrained networks. Hence the goal of this study is to design a path selection algorithm that is energyaware and optimising for the IEEE 802.11s based HWMP. The main idea is that paths with enough energy for transmission must be selected when transmitting packets in the network. Therefore, a simulation using NS-2 was carried out to assess the network performance of the proposed EAPM metric with the other metrics that have been analysed in literature including ETX. ETX has been used in WMNs but was not developed specifically for mesh. In conclusion, EAPM conserves more energy than the Multimetric, airtime link metric and lastly ETX. The simulation experiments show that EAPM optimises the energy used in the network and as a result EAPM has a prolonged network lifespan when comparing it to the rest of the metrics evaluated in this study. The results also revealed that the newly proposed EAPM exhibits superior performance characteristics even with regard to issues like end-to-end delay and packet delivery ratio. / CSIR Meraka Institute
67

Exploring the Sensing Capability of Wireless Signals

Du, Changlai 06 July 2018 (has links)
Wireless communications are ubiquitous nowadays, especially in the new era of Internet of Things (IoT). Most of IoT devices access the Internet via some kind of wireless connections. The major role of wireless signals is a type of communication medium. Besides that, taking advantage of the growing physical layer capabilities of wireless techniques, recent research has demonstrated the possibility of reusing wireless signals for both communication and sensing. The capability of wireless sensing and the ubiquitous availability of wireless signals make it possible to meet the rising demand of pervasive environment perception. Physical layer features including signal attributes and channel state information (CSI) can be used for the purpose of physical world sensing. This dissertation focuses on exploring the sensing capability of wireless signals. The research approach is to first take measurements from physical layer of wireless connections, and then develop various techniques to extract or infer information about the environment from the measurements, like the locations of signal sources, the motion of human body, etc. The research work in this dissertation makes three contributions. We start from wireless signal attributes analysis. Specifically, the cyclostationarity properties of wireless signals are studied. Taking WiFi signals as an example, we propose signal cyclostationarity models induced by WiFi Orthogonal Frequency Division Multiplexing (OFDM) structure including pilots, cyclic prefix, and preambles. The induced cyclic frequencies is then applied to the signal-selective direction estimation problem. Second, based on the analysis of wireless signal attributes, we design and implement a prototype of a single device system, named MobTrack, which can locate indoor interfering radios. The goal of designing MobTrack is to provide a lightweight, handhold system that can locate interfering radios with sub-meter accuracy with as few antennas as possible. With a small antenna array, the cost, complexity as well as size of this device are reduced. MobTrack is the first single device indoor interference localization system without the requirement of multiple pre-deployed access points (AP). Third, channel state information is studied in applications of human motion sensing. We design WiTalk, the first system which is able to do fine-grained motion sensing like leap reading on smartphones using the CSI dynamics generated by human movements. WiTalk proposes a new fine-grained human motion sensing technique with the distinct context-free feature. To achieve this goal using CSI, WiTalk generates CSI spectrograms using signal processing techniques and extracts features by calculating the contours of the CSI spectrograms. The proposed technique is verified in the application scenario of lip reading, where the fine-grained motion is the mouth movements. / Ph. D.
68

Physical layer solutions for ultra-broadband wireless communications in the terahertz band

Han, Chong 27 May 2016 (has links)
In recent years, the wireless data traffic grew exponentially, which was further accompanied by an increasing demand for higher data rates. Towards this aim, Terahertz band (0.1-10 THz) communication is envisioned as one of the key wireless technologies of the next decade. The THz band will help to overcome the spectrum scarcity problems and capacity limitations of current wireless networks, by providing an unprecedentedly large bandwidth. In addition, THz band communication will enable a plethora of long-awaited applications ranging from instantaneous massive data transfer among nearby devices in ultra-high-speed wireless personal and local area networks, to ultra-high-definition content streaming over mobile devices in 5G and beyond small cells. The objective of the thesis is to establish the physical layer foundations of the ultra- broadband communication in the THz band. First, a unified multi-path propagation channel is modeled in the THz band, based on ray-tracing techniques. The wideband characterization are analyzed, which include the distance-varying spectral windows, the delay spread, the wideband capacity and the temporal broadening effects. Second, a multi-wideband waveform design for the THz band is proposed to improve the distance and support ultra- high-speed transmissions. Third, two algorithms for timing acquisition in the pulse-based wireless systems are developed, namely the low-sampling-rate (LSR) algorithm, and the maximum likelihood (ML)-based approach. Fourth, the distance-aware bandwidth resource allocation schemes for the single-user and multi-user THz band networks are developed. Fifth, a three-dimensional (3-D) end-to-end model is developed and characterized, which includes the responses of the graphene-based reflectarray antenna and the 3-D multi-path propagation. The provided physical layer analysis in this thesis lays out the foundation for reliable and efficient ultra-high-speed wireless communications in the THz band.
69

Complex-valued collaborative coding multiple access scheme

Soysa, Gamaethige Francis Robert Sulak January 1999 (has links)
Since recent times the importance of wireless communications has experienced a phenomenal growth, thus incurring a considerable increase in usage of the frequency spectrum available for communications and hence creating the need for efficient methods for its utilisation. Multiple-access is one efficient method, which enables several users to share a common frequency bandwidth. A multiple-access technique known as Collaborative Coding Multiple Access (CCMA) has been theoretically investigated and has been shown to give an increase in channel capacity and bandwidth efficiency. This technique uses a special type of codes known as collaborative codes to enable multiple users to communicate simultaneously over a common frequency bandwidth, thus eliminating the use of time, frequency and orthogonal code divisions. However to implement this technique practically, requires a multiple access channel (MAC) that coherently combines the signals originating from different users to give a composite signal. The combining of signals to implement a CCMA scheme can be easily achieved in baseband channels, where signals can be represented as voltages or currents which can add, to give uniquely identifiable code combinations. However when extended to bandpass carrier channels, the combining of signals over radio channels involves the addition of signals of differing, and, in the mobile situation particularly, varying relative phases and amplitudes. This can give rise to a major detection problem due to the resulting destructive signal combining and thus making CCMA non- practical over radio channels. This thesis describes a novel multiple-access scheme known as Complex-Valued Collaborative Coding Multiple Access (CV-CCMA), to provide a practical system over radio channels that achieves the theoretical promises of CCMA. CV_CCMA overcomes the problem associated with the non-coherent combining of multiple signals over radio channels by employing a complex-valued collaborative code and a combined detection and channel estimation process to estimate the data of each user as well as their associated amplitude and phase variations induced by the channel. The research is initiated with the principles and the theoretical foundations of the CV_CCMA technique. A combined signal detection and channel estimation process is presented. The choice of a suitable collaborative coding scheme is investigated. The conditions for the selection of valid codesets are established for a given number of users, modulation levels and code length. In addition, the effect of channel fading is also investigated. AT-user M-PSK CV_CCMA system operating in Rayleigh and Rician fading channels, is modelled and simulated to establish the error-performance. The results from this investigation are obtained for different number of users and modulation levels. The effect of varying signal power levels is also investigated. Observing the obtained results an additional code selection condition is established for a Rician channel, with an improved error performance. The channel capacity of the CV_CCMA scheme operating in a flat Rayleigh fading channel is obtained. In a given T-user M-PSK CV_CCMA scheme the channel outputs result in multi-level signals. Therefore the channel capacity of CV_CCMA is compared with equivalent multi-level single access schemes. It is shown that the channel capacity of CV_CCMA is greater than the corresponding multi-level schemes. The theoretical channel capacity limits of CV_CCMA is also compared with the limits of TDMA, FDMA and CDMA operating in a flat Rayleigh fading channel. The enhancement of the error performance of CV_CCMA in fading channels is investigated by using space diversity reception and error-control coding. It is found that by using these techniques the error performance of CV_CCMA can be greatly enhanced. For example with a dual-diversity scheme in a flat Rayleigh fading channel, the achieved gain is in the order of 20 dB. Using error-control coding, a coding gain is achieved depending on the type of code used. It is also found that using both of these techniques contributes towards further performance gains depending on the number of diversity paths and the coding scheme. The thesis is finally concluded with an overview of the contributions of this thesis, the achieved results and their implications and suggestions for future work in this subject.
70

EVTM (Ethernet-Via-Telemetry): Get Ethernet Packetized Data Directly from Your Test Article

Schultz, Matt 10 1900 (has links)
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV / This article defines the system design for translating burst Ethernet packetized data into a constant rate serial data stream suitable for transmission over standard telemetry hardware physical links. The system supports both unidirectional (UDP) and bidirectional (TCP/IP, etc.) communications. This paper will evaluate the capabilities and limitations of the established fielded hardware, as well as possibilities for system growth (IRIG Chapter 10 compatibility).

Page generated in 0.0917 seconds